The Bad Connections Table
This screen is accessed by clicking on the status globe from the Using the Legacy Kill Chain screen.
A common task for a security analyst using Stellar Cyber is to stay aware of bad connections. Bad connections are shown in both graphic and tabular format on this screen; the image below provides an example.
The table includes information on the source and destinations of recorded connections. In addition, the application name is provided.
The data on this page is selected with the current filter settings. The filter controls at the top of the page are described in the Filter page.
See Tables for more information on working with tables.